Skip to main content

Demand for Increased M2M Application Security

The substantial financial upside opportunities associated with nascent M2M services has attracted the attention of mobile network operators globally risks being thwarted by the growing security concerns in M2M applications.

Porous security is exposing vulnerabilities in a large number of use-case scenarios, including SCADA systems, telemedicine, and telemetry.

Most M2M applications are lacking the basic security requirements that have been a defacto standard for information and communication technologies elsewhere.

If not addressed sooner, this weak link could throttle the successful adoption of M2M in healthcare, industrial installations, and consumer homes, according to the findings from the latest market study by ABI Research.

"The markets ability to respond to these security challenges at the application level is still underdeveloped," says Michela Menting, senior analyst in cyber security at ABI Research.

When faced with security requirements, the focus has been to tighten the screws at the network level, often to the detriment of the application, leaving it un-patched and exposed.

However, the horizontal evolution of M2M will require full end-to-end security. Significant efforts need to be invested into M2M application security in order for the M2M market to fully evolve.

Whether this is through open source initiatives or standards development, the demand for increased M2M application security will have to be answered, and sooner rather than later.

A number of M2M vendors have already started putting more emphasis on M2M application security in a bid to anticipate future market opportunities.

While the market is still relatively niche, ABI Research forecasts strong growth over the next five years, with global revenues reaching $198 million by 2018.

ABI's latest report on the topic studied the challenges and the addressable market for M2M Application Security, complementing the analyses tackled in their related report about M2M Network Security.

Popular posts from this blog

Bold Broadband Policy: Yes We Can, America

Try to imagine this scenario, that General Motors and Ford were given exclusive franchises to build America's interstate highway system, and also all the highways that connect local communities. Now imagine that, based upon a financial crisis, these troubled companies decided to convert all "their" local arteries into toll-roads -- they then use incremental toll fees to severely limit all travel to and from small businesses. Why? This handicapping process reduced the need to invest in building better new roads, or repairing the dilapidated ones. But, wouldn't that short-sighted decision have a detrimental impact on the overall national economy? It's a moot point -- pure fantasy -- you say. The U.S. political leadership would never knowingly risk the nation's social and economic future on the financial viability of a restrictive duopoly. Or, would they? The 21st century Global Networked Economy travels across essential broadband infrastructure. The forced intro...